Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Aquawise unveils AI-powered water quality technology at TechCrunch Disrupt 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Figma MCP serious vulnerability allows hackers to execute code remotely – patch now
Identity

Figma MCP serious vulnerability allows hackers to execute code remotely – patch now

userBy userOctober 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 8, 2025Ravi LakshmananVulnerability/Software Security

Figma MCP Vulnerability

Cybersecurity researchers have revealed details of a patched vulnerability on the popular figma-developer-mcp Model Context Protocol (MCP) server. This vulnerability could allow an attacker to execute code.

Tracked as CVE-2025-53967 (CVSS score: 7.5), the vulnerability is a command injection bug caused by the unsanitized use of user input, opening the door to a scenario where an attacker can send arbitrary system commands.

According to GitHub’s advisory for the flaw, “The server constructs and executes shell commands using unverified user input directly within the command line string, which could result in shell metacharacter insertions (|, >, &&, etc.).” “If an exploit is successful, remote code can be executed with server process permissions.”

Given that the Framelink Figma MCP server exposes various tools for performing operations on Figma using artificial intelligence (AI)-powered coding agents such as Cursor, attackers can trick MCP clients with indirect prompt injection to cause them to perform unintended actions.

DFIR Retainer Service

Cybersecurity company Imperva, which discovered and reported the issue in July 2025, described CVE-2025-53967 as a “design oversight” in the fallback mechanism, allowing malicious people to execute completely remote code, putting developers at risk of data leaks.

The command injection flaws “occur during construction of command line instructions used to send traffic to the Figma API endpoint,” said security researcher Yohann Sillam.

The exploitation sequence takes place over the next stage.

The MCP client sends an Initialize request to the MCP endpoint and receives the mcp-session-id that will be used for subsequent communication with the MCP server. The client uses the method tools/call to send JSONRPC requests to the MCP server and invokes tools such as get_figma_data and download_figma_images.

The heart of this issue lies in “src/utils/fetch-with-retry.ts” where you first try to retrieve content using the standard fetch API, and if that fails, you will proceed to running the curl command via child_process.exec. This will result in defective command injection.

“Because curl commands are constructed by inserting URLs and header values ​​directly into shell command strings, malicious attackers could create specially designed URLs or header values ​​that insert arbitrary shell commands,” Imperva said. “This can cause remote code execution (RCE) on the host machine.”

A proof-of-concept attack can cause a flaw by remote malicious attackers on the same network (such as public Wi-Fi or compromised corporate devices) sending a series of requests to a vulnerable MCP. Alternatively, an attacker could trick the victim into accessing a specially crafted site as part of a DNS rebind attack.

This vulnerability was resolved in figma-developer-mcp version 0.6.3, released on September 29, 2025. As a mitigation, we recommend that you avoid using child_process.exec on unreliable input and switch to child_process.execFile, which eliminates the risk of shell interpretation.

“As AI-driven development tools evolve and adoption progresses, it’s important to consider security as innovation is tailored,” the Thales-owned company said. “This vulnerability is a clear reminder that even tools intended to run locally can be a powerful intrusion point for attackers.”

CIS Build Kit

The development comes after FireTail revealed that Google has chosen not to fix a new ASCII smuggling attack in Gemini AI chatbots that could be weaponized to create input that could slip through security filters and trigger unwanted responses. Other large-scale language models (LLMs) that are susceptible to this attack include DeepSeek and xAI Grok.

“And this flaw is particularly dangerous when LLMs like Gemini are deeply integrated into enterprise platforms like Google Workspace,” the company said. “This technology allows automated identity spoofing and organizational data poisoning, turning UI flaws into a potential security nightmare.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDiagnostic dilemma: Brain lesion causes woman to experience lifelong bouts of unpleasant laughter
Next Article Psychedelic beer may have helped befriend elite outsiders and consolidate power in pre-Inca Peru
user
  • Website

Related Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025

A single 8-byte write shatters AMD’s SEV-SNP Confidential Computing security

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Aquawise unveils AI-powered water quality technology at TechCrunch Disrupt 2025

Instagram shows PG-13 content to teens by default, adds parental controls

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.